Identifies peoples' position and authority, preventing crimes and reducing losses

June 28, 2010Takenaka Corporation

In a joint development with Toshiba Corporation and Ad-Sol Nissin Corporation, Takenaka Corporation has developed a next-generation security system which enables error-free monitoring using automatic detection by combining electric field communication（※）with high precision image analysis. Sales activities, directed at factories, research laboratories, warehouses, art galleries, etc., will begin in July.
Takenaka will exhibit the Next Generation Security System at 23rd Interphex Japan 2010, Asia's largest international exhibition featuring pharmaceutical, cosmetic and detergent R&D and manufacturing technologies, which will be held at Tokyo Big Sight from June 30 to July 2 of this year.

*

Electric field communication

Electric field communication performs data communication using electric fields which are produced on the surface of human bodies and objects. When an AC signal source comes near to a person, a weak electric field covers the person's body. Data is provided to the slight change of this electric field, realizing information communication. This permits authentication and an exchange of information according to the action called “contact with the object.”

【Outline and unique features of the system】

The following are the outline and unique features of this system..

<Outline>

The electric field communication function, activated automatically by people who have an electric field communication tag, performs registrant authentication. The high precision image analysis, performed by a camera, specifies and tracks people within the controlled area. It also tracks people who do not have an electric field communication tag and people who deliberately avoid authentication as suspicious people.

<Unique features>

Using electric field communication as its authentication method, the system can perform hands-free, accurate, and reliable authentication unaffected by clothing, gloves, or masks, etc., and accurately specify the location of people with electric field communication tags.

With the combination of images obtained by monitoring cameras which record the entire controlled area including people during authentication and authentication information including location information based on electric field communication, the system can specify the locations of people inside the controlled area.

Strong points in a case where an infraction is suspected or has occurred

The system can set the authority of individual persons to have contact with an object requiring priority control in the controlled area based on operating information: who performs which kind of work where and when. Based on this, it can automatically detect whether or not a person has the authority to approach an object, even at the stage where the person is actually approaching the object.

When the system detects an infraction against an object requiring priority control, it tracks the action of a suspicious person using high precision image analysis, at the same time as it alerts the area where the suspicious person is located or the suspicious person. It also records images obtained during the infraction at the same time as it helps hold the suspicious person by transmitting the time, place, and other information concerning the infraction and the position of the suspicious person to portable terminals carried by security guards.

The system tracks the suspicious person and informs security guards of his location even after he has left the location of the infraction at the same time as it prevents him from moving and escaping in conjunction with the entrance/exit system to prevent the suspicious person from gaining authorization to open or close doors.

The system specifies objects which could be damaged based on the infraction location and time information, permitting rapid measures.

【Areas suited to introduce this system】

1.

Factories, laboratories, warehouses, art galleries, server rooms, machinery rooms, archives, etc, which are locations where many people have been given authority to enter, and where controlled objects are not placed in individually locked rooms or storage facilities, etc.

2.

Hospitals, hotels, condominium apartments, etc. which are controlled by distinguishing between outsiders and people with authority to use the areas

【Configuration and Flow of the System】

1.

The system's electric field communication reader-writer, installed in the floor of the controlled area, obtains information from the electric field communication tag carried by people walking above it. (1. A and 1.' B enter room) When the electric field communication reader-writer cannot obtain information from the electric field communication tag carried by a person walking above it, the system tracks the person as a suspicious person.

2.

The monitor cameras, installed to prevent the occurrence of any blind areas in the controlled area, provide the system with images of the suspicious person (1. A and 1.' B). The system attaches information from the electric field communication tags to the person (1) (A or B) and tracks the person.

3.

The system checks the authority of people approaching controlled objects within the controlled area to detect infractions, and continues to track them. (In the case of 2.A who has authority regarding the controlled object, the system detects “authorized”, and in the case of 2.'B who has no authority regarding the controlled object, the system detects “an infraction.”

Detecting an infraction as in (3), the system simultaneously warns the suspicious person and transmits the infraction information and location of the suspicious person to the security guards, records images obtained when it detected the infraction, and contacts the entrance/exit system to help apprehend the suspicious person by restricting his other movement.

4.

Detecting an infraction as in (3), the system simultaneously warns the suspicious person and transmits the infraction information and location of the suspicious person to the security guards, records images obtained when it detected the infraction, and contacts the entrance/exit system to help apprehend the suspicious person by restricting his other movement.

5.

The system contacts the operating system to specify controlled objects which were the objects of the infraction based on the infraction occurrence location and time, and minimizes the loss caused by taking rapid countermeasures (confirming that an infraction occurred, recovery etc.).

Takenaka Corporation provides “Production Facility Engineering” to construct high quality and competitive production facilities which contribute to the advance of industry and “Crime Risk Management” to improve facility security performance through efficient security measures free from waste or defects. The system is planned and designed so that every facility will offer optimum functions.